Home | Amazing | Today | Tags | Publishers | Years | Search 
OSSEC Host-Based Intrusion Detection Guide
OSSEC Host-Based Intrusion Detection Guide
November 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,...
Flowgraph Models for Multistate Time-to-Event Data (Wiley Series in Probability and Statistics)
Flowgraph Models for Multistate Time-to-Event Data (Wiley Series in Probability and Statistics)
The main purpose of this book is to present an introduction to flowgraph models for time-to-event data. The focus is on stochastic models for censored time-to-event  data with competing risks and recurrent events. The applications are geared to survivalanalysis and reliability. I view flowgraph models as providing a methodology for data...
RFID Applied
RFID Applied
Everything you need to know to implement and fully leverage RFID technology

RFID Applied is just that—the application of radio-frequency identification (RFID) technology. The book discusses both the technical and the business issues involved in selecting, developing, and implementing an RFID system.

...
Fractal Geometry: Mathematical Foundations and Applications
Fractal Geometry: Mathematical Foundations and Applications
An accessible introduction to fractals, useful as a text or reference. Part I is concerned with the general theory of fractals and their geometry, covering dimensions and their methods of calculation, plus the local form of fractals and their projections and intersections. Part II contains examples of fractals drawn from a wide variety of areas in...
Communicating Knowledge: Publishing in the 21st Century (Topics in Library and Information Studies)
Communicating Knowledge: Publishing in the 21st Century (Topics in Library and Information Studies)
At the beginning of the twenty-first century, systems of communication are undergoing profound change. Some analysts see this change as revolutionary, comparable with the invention of printing in the west in the fifteenth century, or even of written language itself in the ancient world. Others see it as merely evolutionary, a further application of...
Head First SQL: Your Brain on SQL -- A Learner's Guide
Head First SQL: Your Brain on SQL -- A Learner's Guide
Is your data dragging you down? Are your tables all tangled up? Well we've got the tools to teach you just how to wrangle your databases into submission. Using the latest research in neurobiology, cognitive science, and learning theory to craft a multi-sensory SQL learning experience, Head First SQL has a visually rich format designed for...
Selling IT Training
Selling IT Training
Selling is a skill. Selling in the ever-changing world of IT training is an art. Martin Bean is a uniquely gifted master of this art form. Now he shares his wisdom, his experience, and his insider’s perspective on the challenges and the opportunities of the IT training marketplace. Learn how you can develop the skills and strengths that will...
R Graphics (Computer Science and Data Analysis)
R Graphics (Computer Science and Data Analysis)

R is revolutionizing the world of statistical computing. Powerful, flexible, and best of all free, R is now the program of choice for tens of thousands of statisticians. Destined to become an instant classic, R Graphics presents the first complete, authoritative exposition on the R graphical system. Paul Murrell, widely known as the leading...

Cam Design Handbook: Dynamics and Accuracy
Cam Design Handbook: Dynamics and Accuracy
Packed with hundreds of detailed illustrations! THE DEFINITIVE GUIDE TO CAM TECHNOLOGY!

The transformation of a simple motion, such as rotation, into linear or other motion is accomplished by means of a cam -- two moving elements mounted on a fixed frame. Cam devices are versatile -- almost any specified motion can be...

Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
Database Programming with Visual Basic .NET and ADO.NET: Tips, Tutorials, and Code (Waite Group)
Database Programming with Visual Basic .NET and ADO.NET: Tips, Tutorials, and Code (Waite Group)
The topic combination of VB .NET and ADO.NET is unbeatable. VB .NET is the most popular language in which to code. And, every developer needs to understand ADO.NET to allow data to be accessed from a Web site. In this book Developers will be shown numerouse code examples that will illustr4ate how to program database driven applications within...
Parallel Algorithms and Cluster Computing: Implementations, Algorithms and Applications
Parallel Algorithms and Cluster Computing: Implementations, Algorithms and Applications
This book presents major advances in high performance computing as well as major advances due to high performance computing. It contains a collection of papers in which results achieved in the collaboration of scientists from computer science, mathematics, physics, and mechanical engineering are presented. From the science problems to the...
Result Page: 761 760 759 758 757 756 755 754 753 752 751 750 749 748 747 746 745 744 743 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy